[Dataloss] Best Western Response

Jamie C. Pole jpole at jcpa.com
Tue Aug 26 22:22:01 UTC 2008


Sounds great to me...

I encounter the same problem in the Defense space.  They are very much  
beholden to STIGs and checklists - and I have never caught a hacker in  
possession of either.

This is the difference between security assessment and automated  
compliance testing.  Automated compliance testing (seemingly the  
majority of PCI DSS at this point) can only measure compliance with an  
arbitrary (and outdated, outmoded, obsolete, etc.) baseline.  Security  
assessment SHOULD throw convention to the wind in favor of adopting  
the same mindset as the hacker community.  Any truly competent  
security consultant should be able to do this.

I agree that some "lowest common denominator" can be helpful, but not  
at the expense of and actual security program.  Too many processors  
take their PCI certificate "to the bank", and don't seem to bother  
doing anything else.

That is the fatal flaw in the program.

In addition, the way the PCI QSA program is structured ensures that  
competent security consultants will stay out of it.  Why would anyone  
want to sign on to a program where you have essentially unlimited  
liability, but are forced to base your certification decisions on a  
ridiculous standard?  AND you have to pay them $20,000 initially, and  
$10,000 per year afterward...  Where does that money go???

Your comment about breaching other environments compliant with  
applicable standards is right on the mark.  A rigid standard is not  
the answer to this problem.

Jamie



On Aug 26, 2008, at 6:02 PM, Daniel Clemens wrote:

>
> Better yet, when have you done any penetration testing engagement  
> where the client was 'Compliant with x and y regulation and or  
> standard' and you still gained access? (Probably almost every time  
> or at worst 85% of the time)
>
> This is the exact reason why penetration testing and hacking will  
> almost always win over an institutionalized process and or standard.
> Penetration testing (or whatever you want to call it now days) does  
> not equate to a 'completely formal audit' which I think the PCI (PCI  
> Scanning companies) standards and all the 'certified ethical hacker  
> mindsets'  seem to confuse. They are similar , but they are not the  
> same.
>
> What I think the real complaint is about, -  is the fact that there  
> is a watered down Carolyn Meinel / JP happy hacker mindset which has  
> successfully infected all that follow the logic that security  
> equates to an exact science when fighting against creative minds.
>
> So there , I said it. :P
>
> | Daniel Uriah Clemens
> | http://bits.packetninjas.org
> "Imagination is more important than knowledge."-- Albert Einstein
>
>
>
>
>
>
>
>



More information about the Dataloss mailing list